Wednesday, 27 June 2018

Free Thanatos Ransomware Decryption Tool Released

The Hacker News Daily Updates
Newsletter
cover

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks

Identify vulnerabilities and improve security in the cryptocurrency lifecycle.

Download Now Sponsored
LATEST NEWS Jun 27, 2018

Unpatched WordPress Flaw Gives Attackers Full Control Over Your Site

Last week we received a tip about an unpatched vulnerability in the WordPress core, which could allow a low-privileged user to hijack the whole site and execute arbitrary code on the server. Discovered by researchers at RIPS Technologies GmbH, the "authenticated arbitrary file deletion" ...

Read More
Twitter Facebook LinkedIn

Free Thanatos Ransomware Decryption Tool Released

If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search is over here. Security researchers at Cisco Talos have discovered a weakness in the Thanatos ransomware code that makes it possible ...

Read More
Twitter Facebook LinkedIn

New Malware Family Uses Custom UDP Protocol for C&C Communications

Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking group behind KHRAT backdoor Trojan and has been targeting organizations in South East Asia. According to researchers from Palo Alto, the hacking group, which they ...

Read More
Twitter Facebook LinkedIn

Learn Ethical Hacking Online – A to Z Online Training Pack

Good news for you is that this week's THN Deals brings Ethical Hacking A to Z Bundle that let you get started regardless of your experience level. The Ethical Hacking A to Z Bundle will walk you through the very basic skills you need to start your journey towards becoming a professional ethical ...

Read More
Twitter Facebook LinkedIn

Python-Based Adware Evolves to Install Malicious Browser Extensions

Security researchers have been warning of a few newly detected variants of python-based adware that are being distributed in the wild not only to inject ads but also found installing malicious browser extensions and hidden cryptocurrency miner into victims' computers. Dubbed PBot, or PythonBot, ...

Read More
Twitter Facebook LinkedIn
cover

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks

Identify vulnerabilities and improve security in the cryptocurrency lifecycle.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment